Loading [MathJax]/jax/output/HTML-CSS/jax.js

WAEC Computer Science Past Questions & Answers - Page 81

401.

The Use of electronic systems to send an unsolicited e-mail to someone's address is known as ______

A.

Hacking

B.

Spamming

C.

Internet fraud

D.

Piracy

Correct answer is A

No explanation has been provided for this answer.

402.

An advantage of sequential access over serial access is that_______

A.

Sequential file is slow

B.

Sequential file is detailed

C.

Sequential file does not use key

D.

Individual records can be located more quickly

Correct answer is B

No explanation has been provided for this answer.

403.

Which of the following statements is not true about a computer file?

A.

It is very fast to access any record within a file

B.

It is created electronically

C.

Initial setup is inexpensive

D.

File creation and access are less laborious

Correct answer is C

No explanation has been provided for this answer.

404.

The transaction file can also be described as _______

A.

Master File

B.

Movement file

C.

Reference file

D.

Historical file

Correct answer is B

No explanation has been provided for this answer.

405.

The conversion of 11001 2 to base 10 equals_______

A.

30

B.

28

C.

25

D.

20

Correct answer is C

No explanation has been provided for this answer.